/osnet-11/usr/src/lib/libsip/common/ |
H A D | sip_hash.h | 41 #define SIP_DIGEST_TO_HASH(digest) \ 42 ((digest[0] + digest[1] + digest[2] + digest[3] + digest[4] + \ 43 digest[5] + digest[6] + digest[7]) % SIP_HASH_SZ)
|
H A D | sip_hash.c | 40 * the caller provides the hash table, the digest (opaque), the index into 42 * for removing an object, the caller provides the hash table, the digest 82 * Given the hash table, the digest to be searched for, index into the hash 87 sip_hash_find(sip_hash_t *sip_hash, void *digest, int hindex, argument 98 if (match_func(tmp->sip_obj, digest)) { 135 * Given the hash table, the digest to be searched for, the index into the 140 sip_hash_delete(sip_hash_t *sip_hash, void *digest, int hindex, argument 152 if (del_func(tmp->sip_obj, digest, &found)) {
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Digest/t/ |
H A D | digest.t | 15 is $d->digest, "ooo"; 18 is $d->digest, "ooo"; 22 is $d->digest, "24";
|
H A D | base.t | 23 sub digest { 33 is($ctx->digest, "X0000"); 46 is($ctx->digest, "f0003"); 64 is($ctx->digest, "a0301"); 72 is($ctx->digest, "U0001"); 80 is($ctx->digest, "a0002"); 83 is($ctx->digest, "a0003");
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDigestUtil.c | 49 * context, then calls the corresponding software provided digest 66 session_p->digest.context = malloc(sizeof (MD5_CTX)); 68 if (session_p->digest.context == NULL) { 73 session_p->digest.mech.mechanism = CKM_MD5; 76 MD5Init((MD5_CTX *)session_p->digest.context); 84 session_p->digest.context = malloc(sizeof (SHA1_CTX)); 86 if (session_p->digest.context == NULL) { 91 session_p->digest.mech.mechanism = CKM_SHA_1; 92 session_p->digest.mech.pParameter = pMechanism->pParameter; 93 session_p->digest [all...] |
H A D | softSessionUtil.c | 357 if (session_p->digest.context != NULL) 358 free(session_p->digest.context); 467 /* Check to see if digest operation is active. */ 468 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) { 472 switch (session_p->digest.mech.mechanism) { 511 &session_p->digest, 514 switch (session_p->digest.mech.mechanism) { 516 /* Save MD5_CTX for the active digest operation */ 520 session_p->digest.context, 525 /* Save SHA1_CTX for the active digest operatio [all...] |
H A D | softDigest.c | 60 /* Check to see if digest operation is already active */ 61 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) { 64 * digest.context is only a flat structure. 72 * the message digest. 74 session_p->digest.flags = CRYPTO_OPERATION_ACTIVE; 82 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE; 132 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { 146 if (session_p->digest.flags & CRYPTO_OPERATION_UPDATE) { 149 * operation, so we'll leave the active digest operation 151 * digest updat [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelDigest.c | 73 * the message digest. 75 session_p->digest.flags |= CRYPTO_OPERATION_ACTIVE; 78 session_p->digest.mech.mechanism = pMechanism->mechanism; 79 session_p->digest.mech.pParameter = NULL; 80 session_p->digest.mech.ulParameterLen = 0; 81 session_p->digest.flags |= CRYPTO_EMULATE; 115 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE; 146 crypto_digest_t digest; local 170 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) { 184 if (session_p->digest [all...] |
/osnet-11/usr/src/lib/crypt_modules/sunmd5/ |
H A D | sunmd5.c | 95 md5bit(uint8_t *digest, int bit_num) argument 104 /* return the value of bit N from the digest */ 105 return ((digest[byte_off] & (0x01 << bit_off)) ? 1 : 0); 259 uint8_t digest[DIGEST_LEN]; /* where the MD5 digest is stored */ member in struct:__anon951 268 int indirect_a; /* 7bit index into digest */ 271 int indirect_b; /* 7bit index into digest */ 317 /* compute the digest */ 319 MD5Final(data.digest, &data.context); 331 /* update with the previous digest */ [all...] |
/osnet-11/usr/src/lib/libldap4/include/ |
H A D | sec.h | 20 int key_len, unsigned char *digest);
|
/osnet-11/usr/src/lib/libldap4/sec/ |
H A D | cram_md5.c | 17 /* text is the challenge, key is the password, digest is an allocated 18 buffer (min 16 chars) which will contain the resulting digest */ 20 int key_len, unsigned char *digest) 52 (void) MD5Final(digest, &context); 57 (void) MD5Update(&context, digest, 16); 59 (void) MD5Final(digest, &context); 19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument
|
/osnet-11/usr/src/lib/libldap5/include/ldap/ |
H A D | sec.h | 10 int key_len, unsigned char *digest);
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Digest/t/lib/Digest/ |
H A D | Dummy.pm | 17 sub digest { shift->{d} } subroutine
|
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 17 /* text is the challenge, key is the password, digest is an allocated 18 buffer (min 16 chars) which will contain the resulting digest */ 20 int key_len, unsigned char *digest) 52 (void) MD5Final(digest, &context); 57 (void) MD5Update(&context, digest, 16); 59 (void) MD5Final(digest, &context); 74 unsigned char digest[16]; local 81 bzero(digest, sizeof (digest)); 94 (unsigned char *)cred->bv_val, cred->bv_len, digest); 19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | hash-common.c | 32 /* Run a selftest for hash algorithm ALGO. If the resulting digest 51 unsigned char *digest; local 54 return "digest size does not match expected size"; 84 digest = _gcry_md_read (hd, algo); 86 if ( memcmp (digest, expect, expectlen) ) 87 result = "digest mismatch";
|
H A D | md.c | 1 /* md.c - message digest dispatcher 39 /* This is the list of the digest implementations included in 43 gcry_md_spec_t *digest; member in struct:digest_table_entry 110 gcry_md_spec_t *digest; member in struct:gcry_md_list 177 for (i = 0; !err && digest_table[i].digest; i++) 190 (void *) digest_table[i].digest, 203 gcry_md_spec_t *digest = (gcry_md_spec_t *) spec; local 206 return (! stricmp (digest->name, name)); 213 gcry_md_spec_t *digest = (gcry_md_spec_t *) spec; local 215 gcry_md_oid_spec_t *oid_specs = digest 232 gcry_module_t digest; local 244 gcry_module_t digest; local 256 _gcry_md_register(gcry_md_spec_t *digest, md_extra_spec_t *extraspec, unsigned int *algorithm_id, gcry_module_t *module) argument 308 gcry_md_spec_t *digest = module->spec; local 332 gcry_module_t digest; local 370 gcry_module_t digest; local 404 gcry_module_t digest; local 544 gcry_md_spec_t *digest = NULL; local 1005 gcry_md_hash_buffer(int algo, void *digest, const void *buffer, size_t length) argument 1067 gcry_module_t digest; local 1101 gcry_module_t digest; local [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Digest/ |
H A D | base.pm | 11 sub digest; 56 return unpack("H*", $self->digest(@_)); 62 my $b64 = MIME::Base64::encode($self->digest(@_), ""); 84 C<hexdigest> and C<b64digest> in terms of C<digest>. 87 this implementations of the alternative I<add> and I<digest> methods. 93 digest
|
H A D | file.pm | 17 croak("No digest algorithm specified") unless @_; 28 digest_file_ctx(@_)->digest; 57 This module provide 3 convenience functions to calculate the digest 64 This function will calculate and return the binary digest of the bytes 74 Same as digest_file(), but return the digest in hex form. 78 Same as digest_file(), but return the digest as a base64 encoded
|
/osnet-11/usr/src/lib/libsasl/include/ |
H A D | hmac-md5.h | 34 * digest may be same as text or key 38 unsigned char digest[HMAC_MD5_SIZE]); 58 void _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZE],
|
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/crypto/ |
H A D | md5.h | 54 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon1004
|
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/ |
H A D | Digest.pm | 80 or "hashes", of some data, called a message. The digest is (usually) 81 some small/fixed size string. The actual size of the digest depend of 85 An important property of the digest algorithms is that the digest is 87 property is that digest functions are one-way functions, that is it 89 digest. Algorithms differ in how "likely" and how "hard", as well as 95 digest for a different message it is wise to make it easy to plug in 104 The digest can be delivered in three formats: 120 representation of the digest with any trailing padding removed. The 129 return the digest [all...] |
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Digest/MD5/ |
H A D | MD5.pm | 58 $digest = md5($data); 59 $digest = md5_hex($data); 60 $digest = md5_base64($data); 70 $digest = $ctx->digest; 71 $digest = $ctx->hexdigest; 72 $digest = $ctx->b64digest; 79 output a 128-bit "fingerprint" or "message digest" of the input. 94 This function will concatenate all arguments, calculate the MD5 digest 103 Same as md5(), but will return the digest i [all...] |
/osnet-11/usr/src/grub/grub-0.97/stage2/ |
H A D | md5.c | 215 unsigned char *digest; local 241 digest = md5_final (); 242 memcpy (alt_result, digest, 16); 254 digest = md5_final (); 258 memcpy (alt_result, digest, 16); 277 digest = md5_final (); 284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16); 301 unsigned int w = digest[1 339 unsigned char* digest = md5 (buffer); local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/arcfour/ |
H A D | arcfour_str2key.c | 60 memcpy(key->contents, md4_context.digest, 16); 68 printf("%02x", md4_context.digest[counter]);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/ |
H A D | hmac_md5.c | 53 char digest[MD5_CKSUM_LENGTH]; local 62 * Solaris Kerberos: The digest length is that of MD5_CKSUM_LENGTH not the key 63 * length, as keys can be of varying lengths but should not affect the digest 64 * length. The signing key is the digest and therefore is also the same 110 (CK_BYTE_PTR)digest, (CK_ULONG_PTR)&hashlen)) != CKR_OK) { 115 md5tmp.data = digest;
|